Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Enforcement Framework for Cloud Data Management., , and . IEEE Data Eng. Bull., 35 (4): 39-45 (2012)Preventing Cryptographic Key Leakage in Cloud Virtual Machines., , , and . USENIX Security Symposium, page 703-718. USENIX Association, (2014)Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms., , and . HotSoS, page 1-12. ACM, (2017)SEMROD: Secure and Efficient MapReduce Over HybriD Clouds., , , and . SIGMOD Conference, page 153-166. ACM, (2015)Assuring privacy when big brother is watching., and . DMKD, page 88-93. ACM, (2003)Secure Data Provenance and Inference Control with Semantic Web., , , and . CRC Press, (2014)Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks., , , , and . ECML/PKDD (1), volume 12975 of Lecture Notes in Computer Science, page 788-804. Springer, (2021)SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors., , , and . CCS, page 1211-1228. ACM, (2017)Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store., , , and . ISWC (Posters & Demos), volume 914 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)Risk-Aware Workload Distribution in Hybrid Clouds., , , , , and . IEEE CLOUD, page 229-236. IEEE Computer Society, (2012)